Metasploit 5.0 for Beginners - Second Edition
By :
Metasploit 5.0 for Beginners - Second Edition
By:
Overview of this book
Securing an IT environment can be challenging, however, effective penetration testing and threat identification can make all the difference. This book will help you learn how to use the Metasploit Framework optimally for comprehensive penetration testing.
Complete with hands-on tutorials and case studies, this updated second edition will teach you the basics of the Metasploit Framework along with its functionalities. You’ll learn how to set up and configure Metasploit on various platforms to create a virtual test environment. Next, you’ll get hands-on with the essential tools. As you progress, you’ll learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools and components. Later, you'll get to grips with web app security scanning, bypassing anti-virus, and post-compromise methods for clearing traces on the target system. The concluding chapters will take you through real-world case studies and scenarios that will help you apply the knowledge you’ve gained to ethically hack into target systems. You’ll also discover the latest security techniques that can be directly applied to scan, test, ethically hack, and secure networks and systems with Metasploit.
By the end of this book, you’ll have learned how to use the Metasploit 5.0 Framework to exploit real-world vulnerabilities.
Table of Contents (15 chapters)
Preface
Section 1: Introduction and Environment Setup
Free Chapter
Chapter 1: Introduction to Metasploit and Supporting Tools
Chapter 2: Setting Up Your Environment
Chapter 3: Metasploit Components and Environment Configuration
Section 2: Practical Metasploit
Chapter 4: Information Gathering with Metasploit
Chapter 5: Vulnerability Hunting with Metasploit
Chapter 6: Client-Side Attacks with Metasploit
Chapter 7: Web Application Scanning with Metasploit
Chapter 8: Antivirus Evasion and Anti-Forensics
Chapter 9: Cyber Attack Management with Armitage
Chapter 10: Extending Metasploit and Exploit Development
Chapter 11: Case Studies
Other Books You May Enjoy
Customer Reviews